Internet commerce has been growing at a rapid pace for the last decade. Many firms try to reach wider consumer markets by adding the Internet channel to the existing traditional channels. Despite the various benefits of the Internet channel, a significant number of firms failed in managing the new type of channel. Previous studies could not cleary explain these conflicting results associated with the Internet channel. One of the major reasons is most of the previous studies conducted analyses under a specific market condition and claimed that as the impact of Internet channel introduction. Therefore, their results are strongly influenced by the specific market settings. However, firms face various market conditions in the real worlddensity and disutility of using the Internet. The purpose of this study is to investigate the impact of various market environments on a firm's optimal channel strategy by employing a flexible game theory model. We capture various market conditions with consumer density and disutility of using the Internet. shows the channel structures analyzed in this study. Before the Internet channel is introduced, a monopoly manufacturer sells its products through an independent physical store. From this structure, the manufacturer could introduce its own Internet channel (MI). The independent physical store could also introduce its own Internet channel and coordinate it with the existing physical store (RI). An independent Internet retailer such as Amazon could enter this market (II). In this case, two types of independent retailers compete with each other. In this model, consumers are uniformly distributed on the two dimensional space. Consumer heterogeneity is captured by a consumer's geographical location (ci) and his disutility of using the Internet channel (${\delta}_{N_i}$ ). shows various market conditions captured by the two consumer heterogeneities. (a) illustrates a market with symmetric consumer distributions. The model captures explicitly the asymmetric distributions of consumer disutility in a market as well. In a market like that is represented in (c), the average consumer disutility of using an Internet store is relatively smaller than that of using a physical store. For example, this case represents the market in which 1) the product is suitable for Internet transactions (e.g., books) or 2) the level of E-Commerce readiness is high such as in Denmark or Finland. On the other hand, the average consumer disutility when using an Internet store is relatively greater than that of using a physical store in a market like (b). Countries like Ukraine and Bulgaria, or the market for "experience goods" such as shoes, could be examples of this market condition. summarizes the various scenarios of consumer distributions analyzed in this study. The range for disutility of using the Internet (${\delta}_{N_i}$ ) is held constant, while the range of consumer distribution (${\chi}_i$ ) varies from -25 to 25, from -50 to 50, from -100 to 100, from -150 to 150, and from -200 to 200. summarizes the analysis results. As the average travel cost in a market decreases while the average disutility of Internet use remains the same, average retail price, total quantity sold, physical store profit, monopoly manufacturer profit, and thus, total channel profit increase. On the other hand, the quantity sold through the Internet and the profit of the Internet store decrease with a decreasing average travel cost relative to the average disutility of Internet use. We find that a channel that has an advantage over the other kind of channel serves a larger portion of the market. In a market with a high average travel cost, in which the Internet store has a relative advantage over the physical store, for example, the Internet store becomes a mass-retailer serving a larger portion of the market. This result implies that the Internet becomes a more significant distribution channel in those markets characterized by greater geographical dispersion of buyers, or as consumers become more proficient in Internet usage. The results indicate that the degree of price discrimination also varies depending on the distribution of consumer disutility in a market. The manufacturer in a market in which the average travel cost is higher than the average disutility of using the Internet has a stronger incentive for price discrimination than the manufacturer in a market where the average travel cost is relatively lower. We also find that the manufacturer has a stronger incentive to maintain a high price level when the average travel cost in a market is relatively low. Additionally, the retail competition effect due to Internet channel introduction strengthens as average travel cost in a market decreases. This result indicates that a manufacturer's channel power relative to that of the independent physical retailer becomes stronger with a decreasing average travel cost. This implication is counter-intuitive, because it is widely believed that the negative impact of Internet channel introduction on a competing physical retailer is more significant in a market like Russia, where consumers are more geographically dispersed, than in a market like Hong Kong, that has a condensed geographic distribution of consumers. illustrates how this happens. When mangers consider the overall impact of the Internet channel, however, they should consider not only channel power, but also sales volume. When both are considered, the introduction of the Internet channel is revealed as more harmful to a physical retailer in Russia than one in Hong Kong, because the sales volume decrease for a physical store due to Internet channel competition is much greater in Russia than in Hong Kong. The results show that manufacturer is always better off with any type of Internet store introduction. The independent physical store benefits from opening its own Internet store when the average travel cost is higher relative to the disutility of using the Internet. Under an opposite market condition, however, the independent physical retailer could be worse off when it opens its own Internet outlet and coordinates both outlets (RI). This is because the low average travel cost significantly reduces the channel power of the independent physical retailer, further aggravating the already weak channel power caused by myopic inter-channel price coordination. The results implies that channel members and policy makers should explicitly consider the factors determining the relative distributions of both kinds of consumer disutility, when they make a channel decision involving an Internet channel. These factors include the suitability of a product for Internet shopping, the level of E-Commerce readiness of a market, and the degree of geographic dispersion of consumers in a market. Despite the academic contributions and managerial implications, this study is limited in the following ways. First, a series of numerical analyses were conducted to derive equilibrium solutions due to the complex forms of demand functions. In the process, we set up V=100, ${\lambda}$ =1, and ${\beta}$ =0.01. Future research may change this parameter value set to check the generalizability of this study. Second, the five different scenarios for market conditions were analyzed. Future research could try different sets of parameter ranges. Finally, the model setting allows only one monopoly manufacturer in the market. Accommodating competing multiple manufacturers (brands) would generate more realistic results.
NamGoong, Bong
Journal of the Korean association of regional geographers
/
v.3
no.2
/
/
1997
As a results of researches on the cultivation processes and settlement developments on the Mangyoung river valley as a whole could be have four 'Space-Time Continuity' through a [Origin-Destination] theory model. On a initial phases of cultivation, the cultivation process has been begun at mountain slopes and tributory plains in upper part of river-basin from Koryo Dynasty to early Chosun Dynasty. At first, indigenous peasants burned forests on the mountain slopes for making 'dryfield' for a cereal crops. Following population increase more stable food supply is necessary facets of life inducing a change production method into a 'wetfield' in tributory plains matching the population increase. First sedentary agriculture maybe initiated at this mountain slopes and tributory plains on upper part of river basin through a burning cultivation methods. Mountain slopes and tributory plains are become a Origin area in cultivation processes. It expanded from up to down through the valleys with 'a bits of land' fashion in a steady pace like a terraced fields expanded with bit by bit of land to downward. They expanded their land to the middle part of river basin in mid period of Chosun Dynasty with dike construction techniques on the river bank. Lower part of river cultivated with embankment building techniques in 1920s and then naturally expanded to the tidal marshes on the estuaries and river inlets of coastal areas. 'Pioneer fringes' are consolidated at there in modern times. Changes in landscapes are appeared it's own characters with each periods of time. Followings are results of study through the Mangyoung river valley as a whole. (1) Mountain slopes and tributory plains on the upper part of river are cultivated 'dryfields' by indigenous peasants with Burning cultivation methods at first and developed sedentary settlements at the edges of mountain slopes and on the river terrace near the fields. They formed a kind of 'periphery-located cluster type' of settlement. This type of settlement are become a prominant type in upper part of river basin. 'Dryfields' has been changed into a 'wetfields' at the narrow tributory plains by increasing population pressure in later time. These wetfields are supplied water by Weir and Ponds Irrigation System(제언수리방법). Streams on the tributory plains has been attracted wetfields besides of it and formed a [water+land] complex on it. 'Wetfields' are expanded from up to downward with a terraced land pattern(adder like pattern, 붕전) according to the gradient of valley. These periphery located settlements are formed a intimate ecological linkage with several sets of surroundings. Inner villages are expanded to Outer villages according to the expansion of arable lands into downward. (2) Mountain slopes and tributory plains expanded its territory to the alluvial deposited plains on the middle part of river valley with a urgent need of new land by population increase. This part of alluvial plains are cultivated mainly in mid period of Chosun Dynasty. Irrigation methods are changed into a Dike Construction Irrigation method(천방수리방법) for the control of floods. It has a trend to change the subjectives of cultivation from community-oriented one who constructed Bochang along tributories making rice paddies to local government authorities who could be gather large sums of capitals, techniques and labours for the big dike construction affairs. Settlements are advanced in the midst of plains avoiding friction of distances and formed a 'Centrallocated cluster type' of settlements. There occured a hierarchical structures of settlements in ranks and sizes according merits of water supply and transportation convenience at the broad plains. Big towns are developed at there. It strengthened a more prominant [water+land] complex along the canals. Ecological linkages between settlements and surroundings are shaded out into a tiny one in this area. (3) It is very necessary to get a modern technology of flood control at the rivers that have a large volume of water and broad width. The alluvial plains are remained in a wilderness phase until a technical level reached a large artificial levee construction ability that could protect the arable land from flood. Until that time on most of alluvial land at the lower part of river are remained a wilderness of overgrown with reeds in lacks of techniques to build a large-scale artificial levee along the riverbank. Cultivation processes are progressed in a large scale one by Japanese agricultural companies with [River Rennovation Project] of central government in 1920s. Large scale artificial levees are constructed along the riverbank. Subjectives of cultivation are changed from Korean peasants to Japanese agricultural companies and Korean peasants fell down as a tenant in a colonial situation of that time in Korea. They could not have any voices in planning of spatial structure and decreased their role in planning. Newly cultivated lands are reflected company's intensions, objectives and perspectives for achieving their goals for the sake of colonial power. Newly cultivated lands are planned into a regular Rectangular Block settings of rice paddies and implanted a large scale Bureaucratic-oriented Irrigation System on the cultivated plains. Every settlements are located in the midst of rice paddies with a Central located Cluster type of settlements. [water+land] complex along the canal system are more strengthened. Cultivated space has a characters of [I-IT] landscapes. (4) Artificial levees are connected into a coastal emnankment for a reclamation of broad tidal marshes on the estuaries and inlets of rivers in the colonial times. Subjectives of reclamation are enlarged into a big agricultural companies that could be acted a role as a big cultivator. After that time on most of reclamation project of tidal marshes are controlled by these agricultural companies formed by mostly Japanese capitalists. Reclaimed lands on the estuaries and river inlets are under hands of agricultural companies and all the spatial structures are formed by their intensions, objectives and perspectives. They constructed a Unit Farming Area for the sake of companies. Spatial structures are planned in a regular one with broad arable land for the rice production of rectangular blocks, regular canal systems and tank reservoir for the irrigation water supply into reclaimed lands. There developed a 'Central-located linear type' of settlements in midst of reclaimed land. These settlements are settled in a detail program upon this newly reclaimed land at once with a master plan and they have planned patterns in their distribution, building materials, location, and form. Ecological linkage between Newly settled settlemrnts and its surroundings are lost its colours and became a more artificial one by human-centred environment. [I-IT] landscapes are become more prominant. This region is a destination area of [Origin-Destination] theory model and formed a 'Pioneer Fringe'. It is a kind of pioneer front that could advance or retreat discontinously by physical conditions and socio-cultural conditions of that region.
Chung, Nam-Ho;Kim, Jae-Kyung
Journal of Intelligence and Information Systems
/
v.17
no.4
/
/
2011
With the MICE(Meeting, Incentive travel, Convention, Exhibition) industry coming into the spotlight, there has been a growing interest in the domestic exhibition industry. Accordingly, in Korea, various studies of the industry are being conducted to enhance exhibition performance as in the United States or Europe. Some studies are focusing particularly on analyzing visiting patterns of exhibition visitors using intelligent information technology in consideration of the variations in effects of watching exhibitions according to the exhibitory environment or technique, thereby understanding visitors and, furthermore, drawing the correlations between exhibiting businesses and improving exhibition performance. However, previous studies related to booth recommendation systems only discussed the accuracy of recommendation in the aspect of a system rather than determining changes in visitors' behavior or perception by recommendation. A booth recommendation system enables visitors to visit unplanned exhibition booths by recommending visitors suitable ones based on information about visitors' visits. Meanwhile, some visitors may be satisfied with their unplanned visits, while others may consider the recommending process to be cumbersome or obstructive to their free observation. In the latter case, the exhibition is likely to produce worse results compared to when visitors are allowed to freely observe the exhibition. Thus, in order to apply a booth recommendation system to exhibition halls, the factors affecting the performance of the system should be generally examined, and the effects of the system on visitors' unplanned visiting behavior should be carefully studied. As such, this study aims to determine the factors that affect the performance of a booth recommendation system by reviewing theories and literature and to examine the effects of visitors' perceived performance of the system on their satisfaction of unplanned behavior and intention to reuse the system. Toward this end, the unplanned behavior theory was adopted as the theoretical framework. Unplanned behavior can be defined as "behavior that is done by consumers without any prearranged plan". Thus far, consumers' unplanned behavior has been studied in various fields. The field of marketing, in particular, has focused on unplanned purchasing among various types of unplanned behavior, which has been often confused with impulsive purchasing. Nevertheless, the two are different from each other; while impulsive purchasing means strong, continuous urges to purchase things, unplanned purchasing is behavior with purchasing decisions that are made inside a store, not before going into one. In other words, all impulsive purchases are unplanned, but not all unplanned purchases are impulsive. Then why do consumers engage in unplanned behavior? Regarding this question, many scholars have made many suggestions, but there has been a consensus that it is because consumers have enough flexibility to change their plans in the middle instead of developing plans thoroughly. In other words, if unplanned behavior costs much, it will be difficult for consumers to change their prearranged plans. In the case of the exhibition hall examined in this study, visitors learn the programs of the hall and plan which booth to visit in advance. This is because it is practically impossible for visitors to visit all of the various booths that an exhibition operates due to their limited time. Therefore, if the booth recommendation system proposed in this study recommends visitors booths that they may like, they can change their plans and visit the recommended booths. Such visiting behavior can be regarded similarly to consumers' visit to a store or tourists' unplanned behavior in a tourist spot and can be understand in the same context as the recent increase in tourism consumers' unplanned behavior influenced by information devices. Thus, the following research model was established. This research model uses visitors' perceived performance of a booth recommendation system as the parameter, and the factors affecting the performance include trust in the system, exhibition visitors' knowledge levels, expected personalization of the system, and the system's threat to freedom. In addition, the causal relation between visitors' satisfaction of their perceived performance of the system and unplanned behavior and their intention to reuse the system was determined. While doing so, trust in the booth recommendation system consisted of 2nd order factors such as competence, benevolence, and integrity, while the other factors consisted of 1st order factors. In order to verify this model, a booth recommendation system was developed to be tested in 2011 DMC Culture Open, and 101 visitors were empirically studied and analyzed. The results are as follows. First, visitors' trust was the most important factor in the booth recommendation system, and the visitors who used the system perceived its performance as a success based on their trust. Second, visitors' knowledge levels also had significant effects on the performance of the system, which indicates that the performance of a recommendation system requires an advance understanding. In other words, visitors with higher levels of understanding of the exhibition hall learned better the usefulness of the booth recommendation system. Third, expected personalization did not have significant effects, which is a different result from previous studies' results. This is presumably because the booth recommendation system used in this study did not provide enough personalized services. Fourth, the recommendation information provided by the booth recommendation system was not considered to threaten or restrict one's freedom, which means it is valuable in terms of usefulness. Lastly, high performance of the booth recommendation system led to visitors' high satisfaction levels of unplanned behavior and intention to reuse the system. To sum up, in order to analyze the effects of a booth recommendation system on visitors' unplanned visits to a booth, empirical data were examined based on the unplanned behavior theory and, accordingly, useful suggestions for the establishment and design of future booth recommendation systems were made. In the future, further examination should be conducted through elaborate survey questions and survey objects.
Kwon, Young-Sik;Mun, Jang-Sil
Journal of Distribution Science
/
v.10
no.2
/
/
2012
This paper undertakes a conceptual review of transaction cost to broaden the understanding of the transaction cost analysis (TCA) approach. More than 40 years have passed since Coase's fundamental insight that transaction, coordination, and contracting costs must be considered explicitly in explaining the extent of vertical integration. Coase (1937) forced economists to identify previously neglected constraints on the trading process to foster efficient intrafirm, rather than interfirm, transactions. The transaction cost approach to economic organization study regards transactions as the basic units of analysis and holds that understanding transaction cost economy is central to organizational study. The approach applies to determining efficient boundaries, as between firms and markets, and to internal transaction organization, including employment relations design. TCA, developed principally by Oliver Williamson (1975,1979,1981a) blends institutional economics, organizational theory, and contract law. Further progress in transaction costs research awaits the identification of critical dimensions in which transaction costs differ and an examination of the economizing properties of alternative institutional modes for organizing transactions. The crucial investment distinction is: To what degree are transaction-specific (non-marketable) expenses incurred? Unspecialized items pose few hazards, since buyers can turn toalternative sources, and suppliers can sell output intended for one order to other buyers. Non-marketability problems arise when specific parties' identities have important cost-bearing consequences. Transactions of this kind are labeled idiosyncratic. The summarized results of the review are as follows. First, firms' distribution decisions often prompt examination of the make-or-buy question: Should a marketing activity be performed within the organization by company employees or contracted to an external agent? Second, manufacturers introducing an industrial product to a foreign market face a difficult decision. Should the product be marketed primarily by captive agents (the company sales force and distribution division) or independent intermediaries (outside sales agents and distribution)? Third, the authors develop a theoretical extension to the basic transaction cost model by combining insights from various theories with the TCA approach. Fourth, other such extensions are likely required for the general model to be applied to different channel situations. It is naive to assume the basic model appliesacross markedly different channel contexts without modifications and extensions. Although this study contributes to scholastic research, it is limited by several factors. First, the theoretical perspective of TCA has attracted considerable recent interest in the area of marketing channels. The analysis aims to match the properties of efficient governance structures with the attributes of the transaction. Second, empirical evidence about TCA's basic propositions is sketchy. Apart from Anderson's (1985) study of the vertical integration of the selling function and John's (1984) study of opportunism by franchised dealers, virtually no marketing studies involving the constructs implicated in the analysis have been reported. We hope, therefore, that further research will clarify distinctions between the different aspects of specific assets. Another important line of future research is the integration of efficiency-oriented TCA with organizational approaches that emphasize specific assets' conceptual definition and industry structure. Finally, research of transaction costs, uncertainty, opportunism, and switching costs is critical to future study.
Kim, Younghoon;Choi, HeungSik;Kim, SunWoong
Journal of Intelligence and Information Systems
/
v.26
no.1
/
/
2020
Artificial intelligences are changing world. Financial market is also not an exception. Robo-Advisor is actively being developed, making up the weakness of traditional asset allocation methods and replacing the parts that are difficult for the traditional methods. It makes automated investment decisions with artificial intelligence algorithms and is used with various asset allocation models such as mean-variance model, Black-Litterman model and risk parity model. Risk parity model is a typical risk-based asset allocation model which is focused on the volatility of assets. It avoids investment risk structurally. So it has stability in the management of large size fund and it has been widely used in financial field. XGBoost model is a parallel tree-boosting method. It is an optimized gradient boosting model designed to be highly efficient and flexible. It not only makes billions of examples in limited memory environments but is also very fast to learn compared to traditional boosting methods. It is frequently used in various fields of data analysis and has a lot of advantages. So in this study, we propose a new asset allocation model that combines risk parity model and XGBoost machine learning model. This model uses XGBoost to predict the risk of assets and applies the predictive risk to the process of covariance estimation. There are estimated errors between the estimation period and the actual investment period because the optimized asset allocation model estimates the proportion of investments based on historical data. these estimated errors adversely affect the optimized portfolio performance. This study aims to improve the stability and portfolio performance of the model by predicting the volatility of the next investment period and reducing estimated errors of optimized asset allocation model. As a result, it narrows the gap between theory and practice and proposes a more advanced asset allocation model. In this study, we used the Korean stock market price data for a total of 17 years from 2003 to 2019 for the empirical test of the suggested model. The data sets are specifically composed of energy, finance, IT, industrial, material, telecommunication, utility, consumer, health care and staple sectors. We accumulated the value of prediction using moving-window method by 1,000 in-sample and 20 out-of-sample, so we produced a total of 154 rebalancing back-testing results. We analyzed portfolio performance in terms of cumulative rate of return and got a lot of sample data because of long period results. Comparing with traditional risk parity model, this experiment recorded improvements in both cumulative yield and reduction of estimated errors. The total cumulative return is 45.748%, about 5% higher than that of risk parity model and also the estimated errors are reduced in 9 out of 10 industry sectors. The reduction of estimated errors increases stability of the model and makes it easy to apply in practical investment. The results of the experiment showed improvement of portfolio performance by reducing the estimated errors of the optimized asset allocation model. Many financial models and asset allocation models are limited in practical investment because of the most fundamental question of whether the past characteristics of assets will continue into the future in the changing financial market. However, this study not only takes advantage of traditional asset allocation models, but also supplements the limitations of traditional methods and increases stability by predicting the risks of assets with the latest algorithm. There are various studies on parametric estimation methods to reduce the estimated errors in the portfolio optimization. We also suggested a new method to reduce estimated errors in optimized asset allocation model using machine learning. So this study is meaningful in that it proposes an advanced artificial intelligence asset allocation model for the fast-developing financial markets.
Lee, Hyun Koo;Moon, Hi-Soo;Min, Kyung Duck;Kim, In-Soo;Yun, Hyesu;Itaya, Tetsumaru
Economic and Environmental Geology
/
v.25
no.3
/
/
1992
The Tertiary basins in Korea have widely been studied by numerous researchers producing individual results in sedimentology, paleontology, stratigraphy, volcanic petrology and structural geology, but interdisciplinary studies, inter-basin analysis and basin-forming process have not been carried out yet. Major work of this study is to elucidate evidences obtained from different parts of a basin as well as different Tertiary basins (Pohang, Changgi, Eoil, Haseo and Ulsan basins) in order to build up the correlation between the basins, and an overall picture of the basin architecture and evolution in Korea. According to the paleontologic evidences the geologic age of the Pohang marine basin is dated to be late Lower Miocence to Middle Miocene, whereas other non-marine basins are older as being either Early Miocene or Oligocene(Lee, 1975, 1978: Bong, 1984: Chun, 1982: Choi et al., 1984: Yun et al., 1990: Yoon, 1982). However, detailed ages of the Tertiary sediments, and their correlations in a basin and between basins are still controversial, since the basins are separated from each other, sedimentary sequence is disturbed and intruded by voncanic rocks, and non-marine sediments are not fossiliferous to be correlated. Therefore, in this work radiometric, magnetostratigraphic, and biostratigraphic data was integrated for the refinement of chronostratigraphy and synopsis of stratigraphy of Tertiary basins of Korea. A total of 21 samples including 10 basaltic, 2 porphyritic, and 9 andesitic rocks from 4 basins were collected for the K-Ar dating of whole rock method. The obtained age can be grouped as follows: $14.8{\pm}0.4{\sim}15.2{\pm}0.4Ma$ , $19.9{\pm}0.5{\sim}22.1{\pm}0.7Ma$ , $18.0{\pm}1.1{\sim}20.4+0.5Ma$ , and $14.6{\pm}0.7{\sim}21.1{\pm}0.5Ma$ . Stratigraphically they mostly fall into the range of Lower Miocene to Mid Miocene. The oldest volcanic rock recorded is a basalt (911213-6) with the age of $22.05{\pm}0.67Ma$ near Sangjeong-ri in the Changgi (or Janggi) basin and presumed to be formed in the Early Miocene, when Changgi Conglomerate began to deposit. The youngest one (911214-9) is a basalt of $14.64{\pm}0.66Ma$ in the Haseo basin. This means the intrusive and extrusive rocks are not a product of sudden voncanic activity of short duration as previously accepted but of successive processes lasting relatively long period of 8 or 9 Ma. The radiometric age of the volcanic rocks is not randomly distributed but varies systematically with basins and localities. It becomes generlly younger to the south, namely from the Changgi basin to the Haseo basin. The rocks in the Changgi basin are dated to be from $19.92{\pm}0.47$ to $22.05{\pm}0.67Ma$ . With exception of only one locality in the Geumgwangdong they all formed before 20 Ma B.P. The Eoil basalt by Tateiwa in the Eoil basin are dated to be from $20.44{\pm}0.47$ to $18.35{\pm}0.62Ma$ and they are younger than those in the Changgi basin by 2~4 Ma. Specifically, basaltic rocks in the sedimentary and voncanic sequences of the Eoil basin can be well compared to the sequence of associated sedimentary rocks. Generally they become younger to the stratigraphically upper part. Among the basin, the Haseo basin is characterized by the youngest volcanic rocks. The basalt (911214-7) which crops out in Jeongja-ri, Gangdong-myon, Ulsan-gun is $16.22{\pm}0.75Ma$ and the other one (911214-9) in coastal area, Jujon-dong, Ulsan is $14.64{\pm}0.66Ma$ old. The radiometric data are positively collaborated with the results of paleomagnetic study, pull-apart basin model and East Sea spreading theory. Especially, the successively changing age of Eoil basalts are in accordance with successively changing degree of rotation. In detail, following results are discussed. Firstly, the porphyritic rocks previously known as Cretaceous basement (911213-2, 911214-1) show the age of $43.73{\pm}1.05$ 및 $49.58{\pm}1.13Ma$ (Eocene) confirms the results of Jin et al. (1988). This means sequential volcanic activity from Cretaceous up to Lower Tertiary. Secondly, intrusive andesitic rocks in the Pohang basin, which are dated to be $21.8{\pm}2.8Ma$ (Jin et al., 1988) are found out to be 15 Ma old in coincindence with the age of host strata of 16.5 Ma. Thirdly, The Quaternary basalt (911213-5 and 911213-6) of Tateiwa(1924) is not homogeneous regarding formation age and petrological characteristics. The basalt in the Changgi basin show the age of $19.92{\pm}0.47$ and $22.05{\pm}0.67$ (Miocene). The basalt (911213-8) in Sangjond-ri, which intruded Nultaeri Trachytic Tuff is dated to be $20.55{\pm}0.50Ma$ , which means Changgi Group is older than this age. The Yeonil Basalt, which Tateiwa described as Quaternary one shows different age ranging from Lower Miocene to Upper Miocene(cf. Jin et al., 1988: sample no. 93-33: $10.20{\pm}0.30Ma$ ). Therefore, the Yeonil Quarterary basalt should be revised and divided into different geologic epochs. Fourthly, Yeonil basalt of Tateiwa (1926) in the Eoil basin is correlated to the Yeonil basalt in the Changgi basin. Yoon (1989) intergrated both basalts as Eoil basaltic andesitic volcanic rocks or Eoil basalt (Yoon et al., 1991), and placed uppermost unit of the Changgi Group. As mentioned above the so-called Quarternary basalt in the Eoil basin are not extruded or intruaed simultaneously, but differentiatedly (14 Ma~25 Ma) so that they can not be classified as one unit. Fifthly, the Yongdong-ri formation of the Pomgogri Group is intruded by the Eoil basalt (911214-3) of 18.35~0.62 Ma age. Therefore, the deposition of the Pomgogri Group is completed before this age. Referring petrological characteristics, occurences, paleomagnetic data, and relationship to other Eoil basalts, it is most provable that this basalt is younger than two others. That means the Pomgogri Group is underlain by the Changgi Group. Sixthly, mineral composition of the basalts and andesitic rocks from the 4 basins show different ground mass and phenocryst. In volcanic rocks in the Pohang basin, phenocrysts are pyroxene and a small amount of biotite. Those of the Changgi basin is predominant by Labradorite, in the Eoil by bytownite-anorthite and a small amount pyroxene.
Choi, Yong-Keum;Han, Yang-Keum;Bae, Soo-Myoung;Kim, Jin;Kim, Hye-Jin;Ahn, Se-Youn;Lim, Kun-Ok;Lim, Hee Jung;Jang, Sun-Ok;Jang, Yun-Jung;Jung, Jin-Ah;Jeon, Hyun-Sun;Park, Ji-Eun;Lee, Hyo-Jin;Shin, Bo-Mi
Journal of dental hygiene science
/
v.17
no.6
/
/
2017
The purpose of this study was to provide basic data to standardize the clinical dental hygiene curriculum, based on analysis of current clinical dental hygiene curricula in Korea. We emailed questionnaires to 12 schools to investigate clinical dental hygiene curricula, from February to March, 2017. We analyzed the clinical dental hygiene curricula in 5 schools with a 3-year program and in 7 schools with a 4-year program. The questionnaire comprised nine items on topics relating to clinical dental hygiene, and four items relating to the dental hygiene process and oral prophylaxis. The questionnaire included details regarding the subject name, the grade/semester/credit system, course content and class hours, the number of senior professors, and the number of patients available for dental hygiene clinical training purposes. In total, there were 96 topics listed in the curricula relating to clinical dental hygiene training, and topics varied between the schools. There was an average of 20.4 topic credits, and more credits and hours were allocated to the 4-year program than to the 3-year program. On average, the ratio of students to professors was 21.4:1. Course content included infection control, concepts for dental hygiene processes, dental hygiene assessment, intervention and evaluation, case studies, and periodontal instrumentation. An average of 2 hours per patient was spent on dental hygiene practice, with an average of 1.9 visits. On average, student clinical training involved 19 patients and 26.6 patients in the 3-year and 4-year programs, respectively. The average participation time per student per topic was 38.0 hours and 53.1 hours, in the 3-year and 4-year programs, respectively. Standardizing the clinical dental hygiene curricula in Korea will require consensus guidelines on topics, the number of classes required to achieve core competencies as a dental hygienist, and theory and practice time.
Fattah, A.;Nishiwaki, Y.
Proceedings of the Korean Institute of Intelligent Systems Conference
/
1993.06a
/
/
1993
The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.
Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
Journal of Intelligence and Information Systems
/
v.20
no.1
/
/
2014
Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.